USN-4690-1: coTURN vulnerability
11 January 2021
coTURN could be made to crash or run programs if it received specially crafted network traffic.
- coturn - TURN and STUN server for VoIP
It was discovered that coTURN allowed peers to connect and relay packets to
loopback addresses in the range of 127.x.x.x. A malicious user could use this
vulnerability to insert packages into the loopback interface.
The problem can be corrected by updating your system to the following package versions:
In general, a standard system update will make all the necessary changes.